Intro to ES
Networks
Security
AI & Cloud
ES in Industry
100

Definition of a sensor

device that detects change in the environment

100
Definition of a Network

A network is a collection of 2 or more computers or devices that share information between them

100

1 example of a bad password 

 and

1 example of a good password

12345


1_LOV3_p1zz@

100

Mention 2 providers of cloud services

- Amazon Web Services (AWS) 

- Microsoft Azure       - Oracle    - IBM

- Google Cloud Platform (GCP) 

100

where can a PLC be found?

Production lines

Amusement parks


200

What is a Communication Protocol?

set of rules that guide how data is transmitted and received between devices in a network

200

Key Factors in Network Evaluation

(at least 3)

- Performance: speed, throughput, latency, etc.

- Reliability: stability, resilience

-  Compliance: policies related to data privacy

- Security     - Scalability     - Compatibility: 

- Cost    - User Experience   - Future-proofing

200

   What to do and 

what NOT to do when using 

  Public Wi-Fi ?

- Use HTTPS websites      - enable Firewall

- use a VPN      - verify network authenticity

- avoid sensitive activities: shopping, banking

200

What is Artificial Intelligence

technology that enables computers and machines to simulate human intelligence

200

What is a Human-Machine Interface (HMI)

interface that allows users to monitor and control a system.

300

What is an Embedded system?

combination of hardware and software designed for a specific function

- task-specific

- high-efficiency

- highly reliable and stable

300

Mention 3 different types of Networks

- LAN (Local Area Network)

- WAN (Wide Area Network)

- Cloud Network

- VPN (Virtual Private Network)

300

Mention 3 authentication methods

- Passwords     - Biometric authentication

- Token       - Multi-factor authentication

- PIN (Personal Identification Number)

- Knowledge-based Authentication (KBA)

300

Explain Mobile Device Management

software and security policies to protecting data and content on mobile devices.

includes: monitor data, troubleshoot problems, and even delete the data

300

PLCs and RTUs can be programmed in what language

Ladder Logic or Structured Text (ST)

400

What is a Cyber-Physical System (CPS)?

Physical components connected by a computer, to monitor and control a physical process through digital algorithm

400

explain MAC address

unique hardware static address or physical adress, used to identify devices on a network

400

How does Symmetric encryption works

it utilizes a single key for encryption and decryption.

400

Mention 3 different types of clouds

- Public cloud      - Private cloud

- Hybrid cloud     - Community Cloud

- Multi-Cloud

400

Differences between PLC and RTU

RTUs are mainly for remote locations and can stand more extreme enviroments

PLCs need more power

500

Explain Moore´s Law

The number of transistors (switches that control the flow of electricity) on a microchip would double approximately every two years.

500

Name the layers of the OSI Model in the right order

1. Physical Layer     2. Data-Link Layer

3. Network Layer     4. Transport Layer

5. Session Layer     6. Presentation Layer

7. Application Layer

500

Explain Bluejacking

When attackers send unsolicited messages or files to nearby devices for spam or phishing purposes.

500

     Explain one of these

- IaaS      - PaaS      - SaaS

- IaaS (Infrastructure as a Service): rent servers or virtual machines

- PaaS (Platform as a Service): environment typically for application development (web or mobile apps)

- SaaS (Software as a Service): software applications

500

Main components of a SCADA system

basic explanation how this components work together.

   SCADA Station / Central Control Room

      PLC/RTU                      HMI

Sensors & Actuators

M
e
n
u